Skip to main content

More right-solid
More right-solid
SHOW DETAILS
eye
Title
Date Archived
Creator
In this paper, we investigated a new device, Hetero-junction less (H-JL) Double Gate Tunnel Field Effect Transistors (DGTFET) with high-k. III-V semiconductor material (like InAs-Si) gives excellent performance when InAs uses at source side, because of low band gap of 0.36 eV it reduces the potential barrier height of source channel interface causing maximum carriers are fastly tunnel across the source to drain in ON state whereas Si, at the drain side as higher bandgap Of increasing the...
Topics: Band to Band Tunneling (BTBT), high dielectric material, junctionless, quantum tunnelling, SS,...
International Journal of Trend in Scientific Research and Development
by Dr. Prabha Shreeraj Nair
texts
eye 3
favorite 0
comment 0
Redirection spam refers to a technique where a genuine search user is befooled and made to pass through a chain of redirections and ultimately presented with a compromised web page that may be an adware or an irrelevant content for the user. As a consequence the search engines earn a bad name in quality information retrieval and moreover the users are too dissatisfied. Also, there is sever wastage of expensive network resources like bandwidth. Detecting these malicious redirections is important...
Topics: redirection spam, malicious redirection, spam detection, web security, Iframe, JavaScript...
Today, security is a vital concern in computer science, cryptography is used vastly for implementation of the same. Cryptanalysis is a process in which the security is attempted to breach and the complexity of this process is considered as security measurement. As cryptographic algorithm is open to all, the whole strength lies in the complexity of the key i.e. efforts to crack the key. Mostly the strength of the key is shown through its length, eventually the number of communication (Brute-...
Topics: Genetic algorithm, Ciphers, Encryption, Roulette wheel selection
Titanic disaster occurred 100 years ago on April 15, 1912, killing about 1500 passengers and crew members. The fateful incidents still compel the researchers and analysts to understand what could have led to the survival of some passengers and demise of the others. With the use of machine learning methods and a dataset consisting of 891 rows in the train set and 418 rows in the test set, we attempt to determine the correlation between factors such as age, sex, passenger class, fare etc. to the...
Topics: titanic, prediction, classification, data mining, Rz, python, logistic regression, random forest,...
Over the course of time an organization working with geospatial data accumulates tons of data both in the form of vector and raster formats. This data is a result of co-ordinated processes within the organization and external sources such as other collaborative organizations, projects and agencies, crowd sourcing efforts, etc. The massive amount of data accumulated as a result and the recent developments in the distributed processing of geo-data have catalyzed the development of our...
Topics: Shapefiles, spatio-temporal processing, spatial processing, feature extraction, Biological &...
Titanic disaster occurred 100 years ago on April 15, 1912, killing about 1500 passengers and crew members. The fateful incidents still compel the researchers and analysts to understand what could have led to the survival of some passengers and demise of the others. With the use of machine learning methods and a dataset consisting of 891 rows in the train set and 418 rows in the test set, we attempt to determine the correlation between factors such as age, sex, passenger class, fare etc. to the...
Topics: titanic, prediction, classification, data mining, Rz, python, logistic regression, random forest,...
Today, Intrusion detection system using neural network is interested and measurable area for the researchers. The computational intelligence describe based on following parameters such as computational speed, adaptation, error resilience and fault tolerance. A good intrusion detection system must be satisfied adaptable as requirements. The objective of this paper, provide an outline of the research progress via computational intelligence and neural network over the intrusion detection. In this...
Topics: Intrusion detection, neural network, computational intelligence, Computer Engineering
In this paper, we investigated a new device, Hetero-junction less (H-JL) Double Gate Tunnel Field Effect Transistors (DGTFET) with high-k. III-V semiconductor material (like InAs-Si) gives excellent performance when InAs uses at source side, because of low band gap of 0.36 eV it reduces the potential barrier height of source channel interface causing maximum carriers are fastly tunnel across the source to drain in ON state whereas Si, at the drain side as higher bandgap Of increasing the...
Topics: Band to Band Tunneling (BTBT), high dielectric material, junctionless, quantum tunnelling, SS,...
Today, Intrusion detection system using neural network is interested and measurable area for the researchers. The computational intelligence describe based on following parameters such as computational speed, adaptation, error resilience and fault tolerance. A good intrusion detection system must be satisfied adaptable as requirements. The objective of this paper, provide an outline of the research progress via computational intelligence and neural network over the intrusion detection. In this...
Topics: Intrusion detection, neural network, computational intelligence, Computer Engineering
Genetic Algorithm (GA) has emerged as a powerful tool to discover optimal for multidimensional knapsack problem (MDKP). Multidimensional knapsack problem has recognized as NP-hard problem whose applications in many areas like project selection, capital budgeting, loading problems, cutting stock etc. Attempts has made to develop cluster genetic algorithm (CGA) by mean of modified selection and modified crossover operators of GA. Clustered genetic algorithm consist of (1) fuzzy roulette wheel...
Topics: Multidimensional knapsack problem, Genetic algo-rithm, Fitness function, Crossover, Mutation
Today, security is a vital concern in computer science, cryptography is used vastly for implementation of the same. Cryptanalysis is a process in which the security is attempted to breach and the complexity of this process is considered as security measurement. As cryptographic algorithm is open to all, the whole strength lies in the complexity of the key i.e. efforts to crack the key. Mostly the strength of the key is shown through its length, eventually the number of communication (Brute-...
Topics: Genetic algorithm, Ciphers, Encryption, Roulette wheel selection
International Journal of Trend in Scientific Research and Development
by Dr. Prabha Shreeraj Nair
texts
eye 4
favorite 0
comment 0
Redirection spam refers to a technique where a genuine search user is befooled and made to pass through a chain of redirections and ultimately presented with a compromised web page that may be an adware or an irrelevant content for the user. As a consequence the search engines earn a bad name in quality information retrieval and moreover the users are too dissatisfied. Also, there is sever wastage of expensive network resources like bandwidth. Detecting these malicious redirections is important...
Topics: redirection spam, malicious redirection, spam detection, web security, Iframe, JavaScript...
Genetic Algorithm (GA) has emerged as a powerful tool to discover optimal for multidimensional knapsack problem (MDKP). Multidimensional knapsack problem has recognized as NP-hard problem whose applications in many areas like project selection, capital budgeting, loading problems, cutting stock etc. Attempts has made to develop cluster genetic algorithm (CGA) by mean of modified selection and modified crossover operators of GA. Clustered genetic algorithm consist of (1) fuzzy roulette wheel...
Topics: Multidimensional knapsack problem, Genetic algo-rithm, Fitness function, Crossover, Mutation
International Journal of Trend in Scientific Research and Development
by Dr. Prabha Shreeraj Nair | Prof. Dr. G. K. Awari
texts
eye 6
favorite 0
comment 0
Top-K dominating query returns the k objects that are dominated in a dataset. Finding dominated elements on incomplete dataset is more complicated than in case of complete dataset. In the real- time datasets the dataset can be incomplete due to various reasons such as data loss, privacy preservation or awareness problem etc. In this paper we aims to find top-k elements from an incomplete dataset by providing priority values to each dimension in the data object. Skyline based algorithm is...
Topics: TopKQuery, Dominance, Skyline, Bucketing, Priority, Local Skyline
International Journal of Trend in Scientific Research and Development
by Dr. Prabha Shreeraj Nair ; Prof. Dr. G. K. Awari
texts
eye 2
favorite 0
comment 0
Top-K dominating query returns the k objects that are dominated in a dataset. Finding dominated elements on incomplete dataset is more complicated than in case of complete dataset. In the real- time datasets the dataset can be incomplete due to various reasons such as data loss, privacy preservation or awareness problem etc. In this paper we aims to find top-k elements from an incomplete dataset by providing priority values to each dimension in the data object. Skyline based algorithm is...
Topics: TopKQuery, Dominance, Skyline, Bucketing, Priority, Local Skyline